Insight Search

Sort by:
  • Flash Report

    November 15, 2022
    Last Friday at the 2022 United Nations Climate Change Conference, or Conference of the Parties of the UNFCCC (more commonly referred to as COP27), in Egypt, United States President Joe Biden asserted that global warming posed an existential threat to the planet and promised his country would meet its targets for fighting it. In his speech, he said, “The climate crisis is about human security,…
  • Flash Report

    November 9, 2021
    It's finally here - a historic spending package from the U.S. federal government amounting to more than $1 trillion in infrastructure investments. The question now becomes: What's next? In May 2021, President Joe Biden, following through on a campaign promise, outlined a $2.3 trillion plan[1] to re-engineer the nation’s infrastructure. After weeks of negotiations over the spring and summer,…
  • Whitepaper

    November 18, 2022
    In this issue of the Credit Pulse, we look at credit risk considering the macroeconomic and geopolitical trends likely to shape the financial services industry over the next six months. First, we focus on critical considerations for loan servicers in the post-pandemic era. Then, we discuss risk management practices for non-financial organizations that extend trade credit and institutions that…
  • Survey

    December 9, 2020
    Cybersecurity, privacy, data and resilience dominate the top technology challenges for organisations, according to ISACA/Protiviti global survey of IT audit leaders and professionals In September/October 2020, ISACA and Protiviti conducted a global survey of more than 7,400 IT audit and risk leaders and professionals to obtain their perspectives on the top technology risks their organisations…
  • Flash Report

    March 23, 2022
    Since the crisis in Ukraine began, Protiviti has issued three Flash Reports. The first addressed Vladimir Putin’s initial foray into two Ukrainian regions with “peacekeeping forces,” the West’s initial wave of sanctions and the implications for companies worldwide. The second reported on the unprovoked all-out invasion of Ukraine, the economic fallout and other actions ostracising Russia from the…
  • Blogs

    August 8, 2022
    Mention leading technology companies in the world, and it is doubtful that oilfield service organisations jump to the top of your list. These companies are known for performing the gritty work of producing, maintaining and repairing oil-extracting equipment. They also provide drilling, energy discovery, well maintenance and other vital services to oil and gas companies. But a growing number of…
  • Whitepaper

    September 22, 2022
    Artificial intelligence (AI) is a powerful technology that’s driving innovation, boosting performance, and improving decision-making and risk management across enterprises. It’s also turning data into the key driver of competitive advantage. Over the next two years, organisations across all industries plan to deploy or increase their use of artificial intelligence, according to a recent global…
  • Flash Report

    July 17, 2020
    July 17, 2020 On Thursday, July 16, the Court of Justice of the European Union (CJEU) implemented a landmark ruling in case C-311/18 - Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (more commonly referred to as “Schrems II”). While it concluded that Standard Contractual Clauses (SCCs) issued by the European Commission for the transfer of personal data to data processors…
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
Loading...